Total vulnerabilities in the database
Cybozu Garoon 3.5 through 3.7 SP2 allows remote attackers to bypass Keitai authentication via a modified user ID in a request.
Software | From | Fixed in |
---|---|---|
cybozu / garoon | 3.7-sp2 | 3.7-sp2.x |
cybozu / garoon | 3.5-sp2 | 3.5-sp2.x |
cybozu / garoon | 3.7 | 3.7.x |
cybozu / garoon | 3.5.3 | 3.5.3.x |
cybozu / garoon | 3.5-sp4 | 3.5-sp4.x |
cybozu / garoon | 3.5-sp3 | 3.5-sp3.x |
cybozu / garoon | 3.5 | 3.5.x |
cybozu / garoon | 3.5-sp5 | 3.5-sp5.x |
cybozu / garoon | 3.7-sp1 | 3.7-sp1.x |
cybozu / garoon | 3.5-sp1 | 3.5-sp1.x |